aboutsummaryrefslogtreecommitdiffstats
path: root/nginx/sandcrawler-minio
diff options
context:
space:
mode:
authorBryan Newbold <bnewbold@archive.org>2019-08-09 18:28:37 -0700
committerBryan Newbold <bnewbold@archive.org>2019-08-09 18:28:37 -0700
commit6ac61cd09e8089c59b79edd303f855f74ce58d6c (patch)
tree658e54b7a4463c2f41947623ab7e5a44cf9729c8 /nginx/sandcrawler-minio
parentdb711e1ac9e4b8ba8c9d5229bf310e89ffc27a47 (diff)
downloadsandcrawler-6ac61cd09e8089c59b79edd303f855f74ce58d6c.tar.gz
sandcrawler-6ac61cd09e8089c59b79edd303f855f74ce58d6c.zip
sandcrawler HTTP nginx configs
Diffstat (limited to 'nginx/sandcrawler-minio')
-rw-r--r--nginx/sandcrawler-minio57
1 files changed, 57 insertions, 0 deletions
diff --git a/nginx/sandcrawler-minio b/nginx/sandcrawler-minio
new file mode 100644
index 0000000..2e9bfe3
--- /dev/null
+++ b/nginx/sandcrawler-minio
@@ -0,0 +1,57 @@
+
+server {
+ listen 80;
+ listen [::]:80;
+ listen 443 ssl http2;
+ listen [::]:443 ssl http2;
+ server_name sandcrawler-minio.fatcat.wiki minio.sandcrawler.org;
+
+ ssl_certificate /etc/letsencrypt/live/sandcrawler-minio.fatcat.wiki/fullchain.pem;
+ ssl_certificate_key /etc/letsencrypt/live/sandcrawler-minio.fatcat.wiki/privkey.pem;
+
+ #add_header Content-Security-Policy "default-src 'self' 'unsafe-inline' 'unsafe-eval'; style-src 'self' 'unsafe-inline'";
+ add_header X-Frame-Options "SAMEORIGIN"; # 'always' if nginx > 1.7.5
+ add_header X-Content-Type-Options "nosniff"; # 'always' if nginx > 1.7.5
+ add_header X-Xss-Protection "1";
+ # Enable STS with one year period (breaks http; optional)
+ #add_header Strict-Transport-Security "max-age=31557600; includeSubDomains";
+
+ error_log /var/log/nginx/sandcrawler-errors.log;
+ access_log /dev/null;
+
+ if ($scheme = http) {
+ return 301 https://$server_name$request_uri;
+ }
+
+ location /minio/ {
+
+ # allows all HTTP verbs
+
+ proxy_pass http://localhost:9000;
+ proxy_redirect off;
+
+ proxy_set_header X-Real-IP $remote_addr;
+ proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
+ proxy_set_header Host $http_host;
+ }
+
+ location / {
+ if ($request_method !~ "GET") {
+ return 403;
+ break;
+ }
+
+ proxy_pass http://localhost:9000;
+ proxy_redirect off;
+
+ proxy_set_header X-Real-IP $remote_addr;
+ proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
+ proxy_set_header Host $http_host;
+ }
+
+ # Let's Encrypt SSL Certs
+ location /.well-known/acme-challenge/ {
+ root /var/www/letsencrypt;
+ autoindex off;
+ }
+}